IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed    Add to Google    Add to My Yahoo!
Presidential Decision Directive 63 White Papers (View All Report Types)
 
Service Management for the Mobile Workforce
sponsored by Matrix42
WHITE PAPER: As mobile devices become the workplace norm, your IT department needs to figure out how to make enterprise mobility management (EMM) and IT service management (ITSM) work together. Access this white paper to learn how to plan your IT strategy around integrating modern mobility management and ITSM.
Posted: 16 Feb 2017 | Published: 30 Dec 2016

Matrix42

Reduce the Time it Takes to Resolve IT Issues and Restore IT Services With Communication Integration
sponsored by EverBridge Inc.
WHITE PAPER: In this white paper discover a program that lets you connect the right on-call personnel with the right information to get restoration done faster. Learn how you can get detailed report and incident notifications and responses, manage group and shift calendars from one place, and more.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

EverBridge Inc.

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

App Security: Shore up the Weaknesses in Your WAF
sponsored by tCell
WHITE PAPER: Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses. Uncover the top 5 requirements for an application immune system and how to protect your web applications and modernize your security policy to stand firm against today's threats landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

tCell

Understanding and Overcoming Cloud Security Threats
sponsored by Peak10
WHITE PAPER: The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Peak10

Keep Systems Secure with Best Practices – and Best User Experience – in Mind
sponsored by IBM
WHITE PAPER: Gain a better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough, about 3 MMFA use-case scenarios, what market factors are driving MMFA adoption, and more.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

IBM

Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: In this DNS evaluation guide, learn about the critical role DNS plays in the user experience, the advantages of a cloud-based managed DNS service and key criteria for evaluating a managed DNS service provider.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Dyn

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Dissecting the Spora Ransomware: What Makes This Malware Tick?
sponsored by Booz Allen Hamilton
WHITE PAPER: Meet Spora: it enumerates the drive letters on your system, encrypts your files on those drives, and then drops you a ransom note and login info to buy back your data on its "store". Uncover a rare look into the development and technical information the Spora ransomware in this white paper.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

How GDPR Compliance Can Drive Business Growth and Increase Value
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how to mitigate risk and derive business value as you take on the EU GDPR. Gain access to a comprehensive guide to GDPR, multiple GDPR-related videos, and a breakdown of how to achieve GDPR compliance.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Hewlett-Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement